Stewart Kowalski
Orcid: 0000-0003-3601-8387Affiliations:
- Norwegian University for Science and Technology, Gjøvik, Norway
- Royal Institute of Technology, Kista, Sweden (former)
According to our database1,
Stewart Kowalski
authored at least 57 papers
between 1991 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Simul. Model. Pract. Theory, 2022
A Socio-Technical Regime Transitions Model for Gerontechnology Service Design: Privacy, Information Security and Cyber Security in Focus.
Proceedings of the pHealth 2022 - Proceedings of the 19th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2022
2021
A case study of a municipality phishing attack measures - towards a socio-technical incident management framework.
Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), 2021
Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), 2021
Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), 2021
2020
Towards a Maturity Improvement Process - Systemically Closing the Socio-Technical Gap.
Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020), 2020
Proceedings of the Augmented Cognition. Human Cognition and Behavior, 2020
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2020
2019
A Socio-technical Systems Approach to Design and Support Systems Thinking in Cybersecurity and Risk Management Education.
Complex Syst. Informatics Model. Q., 2019
Deriving Cyber Security Risks from Human and Organizational Factors - A Socio-technical Approach.
Complex Syst. Informatics Model. Q., 2019
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019
Cassandra's Calling Card: Socio-technical Risk Analysis and Management in Cyber Security Systems.
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019
Spiraling out in control: A Video Cartesian Dialectic on a Socio-technical Approach to Teaching Privacy, Information- and Cyber Security (PICS).
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019
Proceedings of the Business Information Systems - 22nd International Conference, 2019
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
2018
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018
Using a Socio-technical Systems Approach to Design and Support Systems Thinking in Cyber Security Education.
Proceedings of the 4th International Workshop on Socio-Technical Perspective in IS development (STPIS'18) co-located with 30th International Conference on Advanced Information Systems Engineering (CAiSE 2018), 2018
Proceedings of the 4th International Workshop on Socio-Technical Perspective in IS development (STPIS'18) co-located with 30th International Conference on Advanced Information Systems Engineering (CAiSE 2018), 2018
2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
I Am Ok, the Material's Not: A Transactional Analysis of Information Security Education Material for Swedish Elementary School Students.
Proceedings of the HCI International 2017 - Posters' Extended Abstracts, 2017
Proceedings of the 3rd International Workshop on Socio-Technical Perspective in IS development (STPIS'17) co-located with 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), 2017
2016
IT Security Incidents Escalation in the Swedish Financial Sector: A Maturity Model Study.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM).
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
2015
Simulating apprenticeship using multimedia in higher education: A case from the information systems field.
Interact. Technol. Smart Educ., 2015
IEEE Secur. Priv., 2015
Proceedings of the E-Technologies - 6th International Conference, 2015
Proceedings of the HCI International 2015 - Posters' Extended Abstracts, 2015
Proceedings of the Advances in Conceptual Modeling, 2015
HIPing Innovation Education in University. Introducing Socio-Technical Concepts for Cross-Disciplinary Teams in Applied Computer Sciences.
Proceedings of the 1st International Workshop on Socio-Technical Perspective in IS Development (STPIS'15) co-located with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015
2014
Proceedings of the HCI in Business - First International Conference, 2014
Proceedings of the Learning and Collaboration Technologies. Designing and Developing Novel Learning Experiences, 2014
A Framework for Synchronizing Human Behavior, Processes and Support Systems Using a Socio-technical Approach.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2014
Generating features for named entity recognition by learning prototypes in semantic space: The case of de-identifying health records.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014
2013
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
Int. J. E Entrepreneurship Innov., 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions-The Need for Security Services.
Int. J. Electron. Gov. Res., 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models.
Proceedings of the Information Security South Africa Conference 2011, 2011
Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
2009
Methodology for Considering Environments and Culture in Developing Information Security Systems.
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Information Assurance and Security Education and Training, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
The cycle of deception - a model of social engineering attacks, defenses and victims.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
2007
Bridging the gap between general management and technicians - A case study on ICT security in a developing country.
Comput. Secur., 2007
2006
A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
2005
An approach to enhance the security of ICT infrastructure through legal, regulatory influences.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
1993
Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification.
Proceedings of the Computer Security, 1993
The SBC Model as a Conceptual Framework for Reporting IT Crimes.
Proceedings of the Security and Control of Information Technology in Society, 1993
1991
Comput. Secur., 1991